Search This Blog

Powered by Blogger.

Blog Archive

Labels

'Flame' worm signed with Microsoft Certificate

Microsoft released an emergency Windows update after revealing that one of its trusted digital signatures was being abused to sign the Flame malware that has infected computers in Iran and other Middle Eastern Countries.

These unauthorised digital certificates allowed the Flame developers to make the malware appear as if it was actually created and approved by Microsoft.

"As soon as we discovered the root cause of this issue, we immediately began building a update to revoke the trust placed in the 'Microsoft Enforced Licensing Intermediate PCA' and 'Microsoft Enforced Licensing Registration Authority CA' signing certificates." The TechNet blog post reads.

Here are the thumbprints of the certificates to be placed in the Untrusted Certificates Store.

Certificate Issued by Thumbprint
Microsoft Enforced Licensing Intermediate PCA Microsoft Root Authority 2a 83 e9 02 05 91 a5 5f c6 dd ad 3f b1 02 79 4c 52 b2 4e 70
Microsoft Enforced Licensing Intermediate PCA Microsoft Root Authority 3a 85 00 44 d8 a1 95 cd 40 1a 68 0c 01 2c b0 a3 b5 f8 dc 08
Microsoft Enforced Licensing Registration Authority CA (SHA1) Microsoft Root Certificate Authority fa 66 60 a9 4a b4 5f 6a 88 c0 d7 87 4d 89 a8 63 d7 4d ee 97

For further information, read this TechNet blog post.

Share it:

CA Hacks

Featured

Malware Report